Sciweavers

1566 search results - page 199 / 314
» Contification Using Dominators
Sort
View
MOBIHOC
2010
ACM
15 years 2 months ago
Breaking bidder collusion in large-scale spectrum auctions
Dynamic spectrum auction is an effective solution to provide spectrum on-demand to many small wireless networks. As the number of participants grows, bidder collusion becomes a se...
Xia Zhou, Haitao Zheng
186
Voted
SCN
2010
Springer
232views Communications» more  SCN 2010»
15 years 2 months ago
Authenticated Key Agreement with Key Re-use in the Short Authenticated Strings Model
Serge Vaudenay [20] introduced a notion of Message Authentication (MA) protocols in the Short Authenticated String (SAS) model. A SAS-MA protocol authenticates arbitrarily long mes...
Stanislaw Jarecki, Nitesh Saxena
COMCOM
2010
167views more  COMCOM 2010»
15 years 2 months ago
Effective load for flow-level performance modelling of file transfers in wireless LANs
Today, a wide range of 802.11-based Wireless LANs (WLANs) have become dominant to provide wireless Internet access for file transfers. For engineering purposes, there is a need fo...
Geert Jan Hoekstra, Robert D. van der Mei
199
Voted
ACCV
2010
Springer
15 years 2 days ago
Descriptor Learning Based on Fisher Separation Criterion for Texture Classification
Abstract. This paper proposes a novel method to deal with the representation issue in texture classification. A learning framework of image descriptor is designed based on the Fish...
Yimo Guo, Guoying Zhao, Matti Pietikäinen, Zh...
TIT
2010
81views Education» more  TIT 2010»
14 years 11 months ago
Generalizing capacity: new definitions and capacity theorems for composite channels
We consider three capacity definitions for composite channels with channel side information at the receiver. A composite channel consists of a collection of different channels with...
Michelle Effros, Andrea J. Goldsmith, Yifan Liang